Handling Personal Data

Slides:



Advertisements
Similar presentations
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Advertisements

Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Legislation in ICT.
Computer Viruses.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
3 Is there something I should know? Exercising our rights.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Data Protection Act. Lesson Objectives To understand the data protection act.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
General Purpose Packages
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
The Data Protection Act [1998]
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
THE DATA PROTECTION ACT Data Protection Act 1998 DPA 1. Reasons2. People3. Principles 4. Exemptions 4 key points you need to learn/understand/revise.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Data Protection Act The Kingsway School. What is Covered? The act was made law in 1984 and was updated in It covers the storage of personal data.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
8 – Protecting Data and Security
The Data Protection Act 1998
The Data Protection Act 1998
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Administrative Practices Outcome 1
Legislation in ICT.
Data Protection Act.
Data Handling Outside School
Data Protection Act.
The Data Protection Act 1998
Topic 6: Issues Press F5 to view!
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
The Data Protection Act & ICT Law
Data Protection Act.
Part 3.
HOW DO I KEEP MY COMPUTER SAFE?
Legislation in ICT.
Communicating in the IT Industry
G061 - Network Security.
Identity Theft Samuel H. Slater.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Handling Personal Data Handling Data: Organizations and Data Handling Handling Personal Data

It’s the law Transcript: Customer: I would like to apply for a credit card. Clerk: I will first process the information on your application form. Customer: That’s fine. Clerk: Oh dear, I’m afraid your application has been declined. Customer: Why? Clerk: According to the credit reference records you have not paid previous credit card companies. Customer: That cannot be me! This is my first credit card! Clerk: I’m afraid I cannot change the data. However, if you write to this address you can find out more details… and have the records changed if you can prove they are wrong. “The data was not updated. It is showing the details of previous residents at that address”.

Transcript: Police Officer: Is this your car? Driver: Yes. Police Officer: Can I see your driving license? Driver: Sure. Police Officer: You will have to accompany me to the station. Driver: Pardon? Police Officer: I have just run a check on this car and it was reported stolen yesterday! Driver: But it’s my car! “Wrong license number entered into the computer”.

Transcript: Customer: I would like to withdraw some money. Bank clerk: Can I have your details please? Customer: Here’s the book with details of my account. Bank clerk: I’m sorry sir, I cannot give you any money. Customer: Why? Bank clerk: According to my records you are dead! “What went wrong there?”

To try and minimize situations like those on the previous slides, the Data Protection Act was passed in 1984 and revised in 1998. This law covers the use of data on living individuals that is stored on a computer. Data users (organizations) who keep such data must register with the Data Protection Registrar. They must give details of: the type of personal data that is going to be held how the data will be obtained who the data will be passed on to whether the data is being transferred to other countries why they need to use the data.

The Data Protection Act says data must be: acquired lawfully used for the purpose that it was acquired relevant: only the data needed should be collected accurate and up-to-date kept only until needed accessible to the individual and, where necessary, be able to have data corrected or removed be kept in a secure place to avoid loss or damage transferred to other organizations only with the consent of the individual (the data subject).

accidental loss of data Watch out! Beware of: hackers accidental loss of data viruses.

Steps to protect data To protect against malicious acts: use passwords to protect files; change passwords regularly encrypt data before sending it through a network use a firewall and up-to-date virus scanning software use an activity log to track use give people different levels of access as required make files read-only to avoid deletion keep computers in locked rooms.

To protect against viruses: scan all incoming e-mails ensure that virus software is always up-to-date do not open suspicious e-mails. To protect against accidental loss and damage: always keep a back-up of all data keep the back-up copy away from the computer do not remove the back-up disk until the back-up is completed and the disk light switched off.

Summary The Data Protection Act was set up in 1984 and revised in 1998. It only covers data about living individuals. It only covers data stored on a computer. Data users (organizations) that hold such data must register with the Data Protection Registrar. There are eight different principles that make up the Data Protection Act. Data can be lost because of a number of reasons; a virus, hackers, or through accidental damage of files. There are a number of steps that can be taken to avoid loss of data. What can I remember? The End